You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: advisories/github-reviewed/2025/03/GHSA-v56r-hwv5-mxg6/GHSA-v56r-hwv5-mxg6.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
{
2
2
"schema_version": "1.4.0",
3
3
"id": "GHSA-v56r-hwv5-mxg6",
4
-
"modified": "2025-03-27T18:02:14Z",
4
+
"modified": "2025-10-24T19:32:06Z",
5
5
"published": "2025-03-27T18:02:14Z",
6
6
"aliases": [
7
7
"CVE-2025-30355"
8
8
],
9
9
"summary": "Synapse vulnerable to federation denial of service via malformed events",
10
-
"details": "### Impact\nA malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild.\n\n### Patches\nFixed in Synapse v1.127.1.\n\n### Workarounds\nClosed federation environments of trusted servers or non-federating installations are not affected.\n\n### For more information\n\nIf you have any questions or comments about this advisory, please email us at [security at element.io](mailto:[email protected]).",
10
+
"details": "### Impact\nA malicious server can craft events with a `depth` outside the integer range allowed by Canonical JSON. When such an event is received by Synapse version up to 1.127.0, it prevents it from federating with other servers. The vulnerability has been exploited in the wild.\n\n### Patches\nFixed in Synapse v1.127.1.\n\n### Workarounds\nClosed federation environments of trusted servers or non-federating installations are not affected.\n\n### For more information\n\nIf you have any questions or comments about this advisory, please email us at [security at element.io](mailto:[email protected]).",
0 commit comments